For Business


Keep Your Security Current

Data security requires ongoing vigilance. Includes tips for keeping your business’ security current and for building processes to...

Monitor Your Service Providers

Data security extends beyond your company’s internal operations. You also need to keep a watchful eye on service providers you hire...

Segment and Monitor Your Network

Know who’s coming into your network and keep hackers out. Includes tips for monitoring traffic and segmenting your network.

Store Information Securely

Make sure data is secure in every stage of its life cycle. Use strong encryption to store and transmit sensitive data securely.

Implement Strong Password Policies

Passwords are critical gateways to your company’s databases and networks. But they’re also potential open doors for hackers....


Secure Remote Access

Companies may need to give employees, clients or service providers remote access to their networks. Includes tips for developing your...

Build Security into Development

Creating a new app or software package? Includes tips for keeping data secure during product design, development, testing and roll-...

Control Access to Data

Companies need to manage who gets their hands on their data. Includes tips for controlling access to sensitive data in your business.

Secure Devices and Paper

Companies need to secure anything that transmits sensitive information, including devices and paper. Includes tips for keeping your...

Start with Security

Does your company use personal information? Don’t collect more than you need, and only hold it as long as you have a business need...


Debt Collection

If you’re in the debt collection business, it’s up to you to comply with the Fair Debt Collection Practices Act.

Cobranza de deudas

Si usted se dedica al negocio de cobranza de deudas, usted tiene la responsabilidad de cumplir con la Ley de Cobranza Imparcial de...

Complying with The Funeral Rule

The Funeral Rule gives people making funeral arrangements some important rights. And it establishes some basic requirements for...

Mobile Apps

Developing mobile apps? These tips help you comply with truth-in-advertising standards and privacy principles.

Endorsement Guides

Do your ads use endorsements or testimonials? The FTC’s endorsement guides establish guidelines for advertisers.

Green Guides

If you’re making claims about the environmental benefits of your products, you must back them up with competent and reliable...

The Business Opportunity Rule

If you sell business opportunities, the FTC’s Business Opportunity Rule requires that you give potential buyers a one-page disclosure...

Protecting Your Business From Fraud

Protect your business from con artists who try to fool you into paying for office supplies, business directory listings, or Internet...

Fraud - An Inside Look

Real consumers, who fell for the pitch, tell their stories and a former scammer gives an insider account of how these operations use...

Complying with the CAN SPAM Act

If you use email to promote your products or services, there are seven things you need to know to comply with CAN-SPAM.

Peer-to-Peer File Sharing

Any company that collects and stores sensitive information must consider the security implications of using Peer-to-Peer (P2P) file...

Fraud - An Inside Look (short version)

Real consumers, who fell for the pitch, tell their stories and a former scammer gives an insider account of how these operations use...

Complying with Do Not Call

If you market your products or services by phone -- or if someone has hired you to handle their telemarketing for them -- it's a good...